Analysis

  • max time kernel
    40s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2023 18:40

General

  • Target

    fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c.exe

  • Size

    1.1MB

  • MD5

    7efcf50d722b6259120d33df12b5cbdd

  • SHA1

    b1af7de0d8cb5748d87524ffea340c0c414c38a6

  • SHA256

    fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c

  • SHA512

    efd31ef9296271c4b5c0ecd954c53ee6b4a31c7b772ffe9fe11b0c65c6b45a70806b92ff8f63e4c346419d0189433013374dddbc01bf984ad91660e6f0b68cb5

  • SSDEEP

    24576:UyHnLS2B41PUm8xwylQWaPxk2s2X3s9JINiO9UawWKx12rfpsttnLZ:jHLSD1PUfwYQXkR2X3Hr/wlXspstt

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c.exe
    "C:\Users\Admin\AppData\Local\Temp\fd9ba5fdb9c7a11812ef8aed5ef7afda54bed718c57f83e2dc39463348594c2c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 644
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1692

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
    Filesize

    702KB

    MD5

    644635a515aa584531dd87d2a84f6086

    SHA1

    4e81b83adf6c8c5fa179fc36a8e14c072b0e56a3

    SHA256

    ce693faacf53e5784d1c8629c0f7e6b5b4895661fb70519e2d97e8c813f92453

    SHA512

    9552274c61b1a3b117c8ca554a86267787300c0bf669ac9500293c88810f1c3c485e1ce1c2b25741a2c1fe72760e48c3d29b0976b7c4f1a9e79d1c938032c5d6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
    Filesize

    702KB

    MD5

    644635a515aa584531dd87d2a84f6086

    SHA1

    4e81b83adf6c8c5fa179fc36a8e14c072b0e56a3

    SHA256

    ce693faacf53e5784d1c8629c0f7e6b5b4895661fb70519e2d97e8c813f92453

    SHA512

    9552274c61b1a3b117c8ca554a86267787300c0bf669ac9500293c88810f1c3c485e1ce1c2b25741a2c1fe72760e48c3d29b0976b7c4f1a9e79d1c938032c5d6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
    Filesize

    306KB

    MD5

    cc1e9ce41b6824fbfe80c60e3a602f16

    SHA1

    50a5f15faad1ed124521683d8acdefc7bde389a3

    SHA256

    854e183c9ed25742be60b28a3103e77043958e01d81353102bb0f08f00c154b2

    SHA512

    15b10e578526c19821faf36b1557c69188ca056ec5508bb14e7e7a78fc4467e92feeccddea76c725675fc1a2e57060499a6020dedad6ae0f95e0cc15a2103fba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
    Filesize

    306KB

    MD5

    cc1e9ce41b6824fbfe80c60e3a602f16

    SHA1

    50a5f15faad1ed124521683d8acdefc7bde389a3

    SHA256

    854e183c9ed25742be60b28a3103e77043958e01d81353102bb0f08f00c154b2

    SHA512

    15b10e578526c19821faf36b1557c69188ca056ec5508bb14e7e7a78fc4467e92feeccddea76c725675fc1a2e57060499a6020dedad6ae0f95e0cc15a2103fba

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
    Filesize

    185KB

    MD5

    ada578b373b2348cd24a72a1b4d5a72d

    SHA1

    49dfbb816135cff2265df55cb2fa7e2f48d5a574

    SHA256

    cb54b9473cba80e9d3f38a42ad00f1cbb19411163e0018790ef7c98235563aa1

    SHA512

    550231a12e8e11b7818b538800389a960deda668e10c1b5e3e7d762dee4340f25603b7085a8c985452c0725ddcbe4228851468ed7fc465c9b870853dd6c41e31

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
    Filesize

    185KB

    MD5

    ada578b373b2348cd24a72a1b4d5a72d

    SHA1

    49dfbb816135cff2265df55cb2fa7e2f48d5a574

    SHA256

    cb54b9473cba80e9d3f38a42ad00f1cbb19411163e0018790ef7c98235563aa1

    SHA512

    550231a12e8e11b7818b538800389a960deda668e10c1b5e3e7d762dee4340f25603b7085a8c985452c0725ddcbe4228851468ed7fc465c9b870853dd6c41e31

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
    Filesize

    702KB

    MD5

    644635a515aa584531dd87d2a84f6086

    SHA1

    4e81b83adf6c8c5fa179fc36a8e14c072b0e56a3

    SHA256

    ce693faacf53e5784d1c8629c0f7e6b5b4895661fb70519e2d97e8c813f92453

    SHA512

    9552274c61b1a3b117c8ca554a86267787300c0bf669ac9500293c88810f1c3c485e1ce1c2b25741a2c1fe72760e48c3d29b0976b7c4f1a9e79d1c938032c5d6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z2571293.exe
    Filesize

    702KB

    MD5

    644635a515aa584531dd87d2a84f6086

    SHA1

    4e81b83adf6c8c5fa179fc36a8e14c072b0e56a3

    SHA256

    ce693faacf53e5784d1c8629c0f7e6b5b4895661fb70519e2d97e8c813f92453

    SHA512

    9552274c61b1a3b117c8ca554a86267787300c0bf669ac9500293c88810f1c3c485e1ce1c2b25741a2c1fe72760e48c3d29b0976b7c4f1a9e79d1c938032c5d6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
    Filesize

    306KB

    MD5

    cc1e9ce41b6824fbfe80c60e3a602f16

    SHA1

    50a5f15faad1ed124521683d8acdefc7bde389a3

    SHA256

    854e183c9ed25742be60b28a3103e77043958e01d81353102bb0f08f00c154b2

    SHA512

    15b10e578526c19821faf36b1557c69188ca056ec5508bb14e7e7a78fc4467e92feeccddea76c725675fc1a2e57060499a6020dedad6ae0f95e0cc15a2103fba

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z5081621.exe
    Filesize

    306KB

    MD5

    cc1e9ce41b6824fbfe80c60e3a602f16

    SHA1

    50a5f15faad1ed124521683d8acdefc7bde389a3

    SHA256

    854e183c9ed25742be60b28a3103e77043958e01d81353102bb0f08f00c154b2

    SHA512

    15b10e578526c19821faf36b1557c69188ca056ec5508bb14e7e7a78fc4467e92feeccddea76c725675fc1a2e57060499a6020dedad6ae0f95e0cc15a2103fba

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
    Filesize

    185KB

    MD5

    ada578b373b2348cd24a72a1b4d5a72d

    SHA1

    49dfbb816135cff2265df55cb2fa7e2f48d5a574

    SHA256

    cb54b9473cba80e9d3f38a42ad00f1cbb19411163e0018790ef7c98235563aa1

    SHA512

    550231a12e8e11b7818b538800389a960deda668e10c1b5e3e7d762dee4340f25603b7085a8c985452c0725ddcbe4228851468ed7fc465c9b870853dd6c41e31

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\o8403415.exe
    Filesize

    185KB

    MD5

    ada578b373b2348cd24a72a1b4d5a72d

    SHA1

    49dfbb816135cff2265df55cb2fa7e2f48d5a574

    SHA256

    cb54b9473cba80e9d3f38a42ad00f1cbb19411163e0018790ef7c98235563aa1

    SHA512

    550231a12e8e11b7818b538800389a960deda668e10c1b5e3e7d762dee4340f25603b7085a8c985452c0725ddcbe4228851468ed7fc465c9b870853dd6c41e31

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\p9007021.exe
    Filesize

    145KB

    MD5

    94e3e35527bb6312f21ac9ef3fedc750

    SHA1

    ee04792e7cb0be13e62dfcb1990f70b4cf690980

    SHA256

    181320d3ea2684c6d216dad2825dad42afee2e699c6eaaeffb44e612fd98db2f

    SHA512

    a1ab7c6af0ff46f1223e9180e32376268dab090de61c9fd70767a32816feba43e3e81856526eaa825e4fdd15b50aa698c5a8606e813756c73e762aaf1e1af372

  • memory/976-123-0x00000000013B0000-0x00000000013DA000-memory.dmp
    Filesize

    168KB

  • memory/1384-95-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-101-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-103-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-105-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-107-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-109-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-111-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-113-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-115-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-116-0x0000000004B00000-0x0000000004B40000-memory.dmp
    Filesize

    256KB

  • memory/1384-99-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-97-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-93-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-91-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-89-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-88-0x00000000007A0000-0x00000000007B6000-memory.dmp
    Filesize

    88KB

  • memory/1384-87-0x0000000004B00000-0x0000000004B40000-memory.dmp
    Filesize

    256KB

  • memory/1384-86-0x0000000004B00000-0x0000000004B40000-memory.dmp
    Filesize

    256KB

  • memory/1384-85-0x00000000007A0000-0x00000000007BC000-memory.dmp
    Filesize

    112KB

  • memory/1384-84-0x00000000003E0000-0x00000000003FE000-memory.dmp
    Filesize

    120KB